I don't see how. The keylogger logs every keystroke and therefore logs the
access credentials to RDP to the server.

 

Regards, 
Hank Arnold 


Consumer Security

 

"There are 10 kinds of people in the world...

Those who understand binary and those who don't." 

 

My Blog:  <http://it.toolbox.com/blogs/personal-pc-assistant/>
http://it.toolbox.com/blogs/personal-pc-assistant/ 

Twitter: @Hank_PCDoc
Facebook:  <https://www.facebook.com/hank.arnold.96>
https://www.facebook.com/hank.arnold.96

 

From: [email protected] [mailto:[email protected]]
On Behalf Of J- P
Sent: Monday, January 26, 2015 1:19 PM
To: NT
Subject: [NTSysADM] keylogger and RDP

 

Hi all,


If a pc is infected with a keylogger or some other malware,  would that be
able to compromise an RDP session made from the infected computer?

Scenario 1;  Infected pc goes online and logs into a bank account ( now
everything is logged /compromised)

Scenarios 2; Infected pc creates RDP session to uninfected server,  goes
online and logs into bank account 

Did scenario 2  help mitigate the compromise in anyway?

TIA





Reply via email to